Researchers at the US cybersecurity company FireEye have discovered that hackers have begun to probe the defenses of banks in the Middle East by targeting bank employees with malware-infected emails to collect information about bank networks and user accounts.
The company started an investigation into the cyberattack in February in which hackers were able to steal $81 million from Bangladesh’s central bank. FireEye found no apparent connection between that attack and the similar attacks against banks in Vietnam and Ecuador. Currently in all three cases the hackers responsible for the attacks are unknown.
A new security report by digital identity company ThreatMetrix says hackers are using a large army made out of "automated cyber robots", or bots, for financial gain.
Their Q1 2016 report, entitled Q1 Cybercrime Report, says there have been 311 million bot attacks detected and stopped in this year’s first quarter.
When Google announced the launch of two new messaging apps, the world wondered why. Duo is focused on video calling, while Allo is a more traditional messaging tool, albeit one with a Google assistant built in.
But while the world shrugged, Edward Snowden issued a stark warning. He says that Allo should be avoided, pointing out that the lack of end-to-end encryption makes it "dangerous".
Admit it, we’ve all been thinking about the summer vacation since the blustery days of winter. Dreaming of destinations, looking at dates and ultimately, sending those out-of-office notices so that everyone knows we’re taking a break and heading out of town!
But while most of us are safe to switch those out-of-office messages on and tune out on our summer trips, IT is an industry that never truly gets a vacation. No matter the time of year, IT departments are always hard at work creating and maintaining the foundation of the modern business world. Among the top reasons why IT never goes on vacation, three are:
Consumers in the EMEA region (Europe, Middle East, Africa) are fairly skeptical about companies keeping their data safe, but are willing to share personal information to get something in return anyway.
Those are the results of a new and extensive research by F5 Networks, which had asked more than 7,000 consumers in UK, Germany, France, Bene, United Arab Emirates, Saudi Arabia and Poland about their online shopping habits, and data attitudes.
Another confirmation of the heading IT departments are taking this year comes to us from tech giants Toshiba. After an extensive research into business practices in IT departments across Europe, it was found that cloud-based solutions (56 percent) and data security (50 percent) remain the biggest areas of investment for IT departments in the country this year.
The research shows results of a poll of 400 senior IT decision makers in the UK, France and Germany.
Hacking and cyber attacks are no longer confined to computers. Thanks to the Internet of Things they affect a whole lot of other equipment too and that includes medical devices.
Application protection specialist Arxan has produced an infographic looking at the growing threat landscape surrounding connected medical devices.
The email addresses and private messages of over 470,000 members of the popular hacking website Nulled have been leaked following a data breach.
The website served as a marketplace where its users could buy and sell the account details they stole from users along with hacking advice and tips. The data that was leaked from Nulled contained over 5,000 purchase records that detailed how the stolen information available on the site’s marketplace was exchanged between users.
Compliance professionals need to supervise all types of business communications, but a new survey shows that they're struggling to keep pace with the volume and variety of electronic channels.
Hosted archiving specialist Smarsh has released its sixth annual Electronic Communications Compliance Survey Report. The survey, of compliance professionals in the financial services industry, highlights that supervision practices aren't sufficiently addressing the compliance implications of ongoing trends, like increased regulatory scrutiny and the challenge of adapting to channels like social media and text messaging.
As more and more devices get added to the Internet of Things the risks they present get larger. A recent report from the BBC has highlighted the fact that buildings and their systems for heating, lighting and even security may be at risk.
We spoke to Péter Gyöngyösi, product manager of Blindspotter at contextual intelligence specialist Balabit, to find out more about the risks smart buildings present and how landlords and tenants can guard against them.
Ransomware is not exactly a new problem, but it's one that seems to be getting increasingly serious. Every week there's a new high profile attack out there including the likes of CryptXXX and PETYA. One of the biggest names, TeslaCrypt, has suddenly thrown in the towel and offered up a free decryption key for its victims.
The surprise move comes just a couple of months after version 4 of TeslaCrypt gained what was described as "unbreakable encryption". The closure is somewhat bittersweet. The shutdown comes as attackers switch to using CryptXXX instead, but perhaps the most surprising aspect is the fact that the site formerly used to accept Bitcoin ransom payments is now where you'll find the decryption key needed to gain access to your files.
Cast your mind back to 2012 and the LinkedIn hack that had the grown up's social network scurrying to advise its users to change their passwords.
It was thought at the time that the 6.5 million sets of credentials posted on a Russian password forum was the extent of the breach. However, four years on a hacker under the name of 'Peace' is offering for sale a database of millions more LinkedIn accounts.
Thanks to their shifting population and the volume of personal and other valuable data that passes through them, universities have long been targets for cyber attacks.
With users that interact with a wider zone of the internet than any other group, university networks are particularly vulnerable to all types of attacks, from Trojan horse ploys to spear phishing.
Security experts at McAfee have unveiled a new cyber-security education hub, aimed at making people stay safer online. It is called the Ultimate Guide to Security Threats.
The security firm decided to create the hub after realizing that many people are still fairly uneducated when it comes to cyber-security. At the same time, cyber-crime is growing at an unprecedented rate.
The Internet of Things is here to stay, but it presents a number of new security risks. Despite this, 81 percent of companies say they intend to roll out IoT devices by 2017.
This is according to research from DDoS mitigation specialist Neustar which has produced an infographic looking at the risks the IoT presents.